Skip to main content
Log in

Concealing data in a digital image with multilayer security

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

In this paper, a new type of algorithm is proposed in which steganography is combined with cryptography for concealing secret data in a digital image with multilayer security. A flexible matrix is used in combination with Pythagorean Theorem to develop a novel symmetric key to add a double layer of security to the secret data. Third layer of security to the data is added using a modified form of moderate significant bit alteration technique. In addition to this, pixel adjustment process is also improved upon to improve the visual perception of stego-imagesubstantially. In order to examine the visual perception of the stego-image qualitatively, histogram analysis is carried out. Image-quality-metrics are also estimated in order to evaluate the quality of the stego-images quantitatively. Moreover, in order to validate the effectiveness of the proposed algorithm, T-test is applied at 1 % level of significance. It has been validated experimentally that the proposed algorithm provides higher security as well as robustness to the attacks on the stego-image. The results of this study are, in fact, quite promising.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Abhilash G, Sudhakar KN, Mungara J (2012) Advanced symmetric keycryptography using extended MSA method: BLZ symmetric key algorithm. Int J Comput Sci Eng Technol 2(7):1321–1326

    Google Scholar 

  2. Amirtharajan R, Rayappan JBB (2012) An intelligent chaotic embedding approach to enhance stego-image quality. Inf Sci 193:115–124

    Article  Google Scholar 

  3. Apostol TM (1976) Introduction to Analytic Number theory. Springer

  4. Balkrishan SAP (2010) Hiding encrypted data using randomly chosen moderate bit insertion in digital imagesteganography. Int J Comput Sci Eng 1(2):21–27

    Google Scholar 

  5. Balkrishan SAP (2013) Enhanced bandwidth utilization in image steganography with enhanced data security. Int J Comput Appl 84(11):31–38

    Google Scholar 

  6. Balkrishan, Singh AP (2011) Moderate bit insertion for hiding crypto data in digital image for steganography. IJCA, Special issues on IP Multimedia Communications 136–138

  7. Bender W, Gruhl D, Morimoto N, Lu A (1996) Techniques for data hiding. IBM Syst J 35(3 & 4):313–336

    Article  Google Scholar 

  8. Chan CK, Cheng LM (2001) Improved hiding data in images by optimal moderately-significant-bit replacement. Electron Lett 37(16):1018–1019

    Article  Google Scholar 

  9. Chan CK, Cheng LM (2004) Hiding data in images by simple LSB substitution. Pattern Recogn 37(3):469–474

    Article  MATH  Google Scholar 

  10. Chang CC, Hsiao JY, Chan CS (2003) Finding optimal lsb substitution in image hiding by dynamic programming strategy. Pattern Recogn 36(7):1583–1595

    Article  Google Scholar 

  11. Chang CC, Lin MH, Hu YC (2002) A fast and secure image hiding scheme based on LSB substitution. Int J Pattern Recognit Artif Intell 16(4):399–416

    Article  Google Scholar 

  12. Cheddad A, Condell J, Curran K, Kevitts PM (2010) Digital image steganography: surveyand analysis of current methods. Signal Process 90(3):727–52

    Article  MATH  Google Scholar 

  13. Cheddad A, Condell J, Curran K, McKevitt P (2010) A hash-based image encryption algorithm. Opt Commun 283(6):879–893

    Article  Google Scholar 

  14. Chen LS, Zheng GX (2005) Chaos-based encryption for digital images and videos. In Furht, B. & Kirovski, D. Multimedia Security Handbook. CRC Press

  15. Dey S, Nath J, Nath A (2012) An advanced combined symmetric key cryptographic method using bit manipulation, bit reversal, modified caesar cipher (SD-REE), DJSA method, TTJSA method: SJA-I Algorithm. Int J Comput Appl 46(20):46–53

    Google Scholar 

  16. Forouzan BA (2008) Cryptography and network security. Publisher McGraw-Hill Higher Education, India

    Google Scholar 

  17. Gonzalez RC, Woods RE (2003) Digital image processing, 3rd edn. Prentice-Hall, Englewood Cliffs

    Google Scholar 

  18. Guha S, Das T, Ghosh S, Nath J, Das S, Nath A (2012) A new data hiding algorithm withencrypted secret message using TTJSA symmetric key crypto system. J Global Res Comput Sci 3(4):11–16

    Google Scholar 

  19. Jindal B, Singh AP (2013) Camouflaging in digital image for secure communication. J IE(I)-Springer Electric Electron Telecommun Comput Eng 94(2):85–92

    Google Scholar 

  20. Jindal B, Singh AP (2014) Image steganography with multilayer security using moderate bit substitution. J Appl Sci 14(8):738–747

    Article  Google Scholar 

  21. Pol K (2014) Image steganography based on DWT using Huffman LWZ Encoding. Int J Eng Tech Res 2(3):100–103

    Google Scholar 

  22. Potdar VM, Chang E (2004) Grey level modification steganography for secret communication. In Proceedings of IEEE 2nd International Conference on Industrial Informatics INDIN 04, Berlin, Germany 223 – 228

  23. Rajyaguru MH (2012) Crystography combination of cryptography and steganography with rapidly changing keys. Int J Emerg Technol Ad Eng 2(10):329–332

    Google Scholar 

  24. Satir E, Isik H (2012) A compression-based text steganography method. J Syst Softw 85(10):2385–2394

    Article  Google Scholar 

  25. Satir E, Isik H (2014) A Huffman compression based text Steganography method. Multimed Tools Appli 70(3):1–26

    Google Scholar 

  26. Thien CC, Lin JC (2003) A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function. Pattern Recogn 36(12):2875–2881

    Article  MATH  Google Scholar 

  27. Usha S, Kumar GAS, Boopathybagan K (2011) A secure triple level encryption methodusing cryptography and steganography. In Proceeding of IEEE International Conference on Computer Science and Network Technology (ICCSNT), Harbin, 24–26 Dec. vol. 2, 1017–1020

  28. Usman K, Juzoji H, Nakajima I, Soegidjoko S, Ramdhani M, Hori T, Igi S(2007) Medical image encryption based on pixel arrangement and random permutation for transmission security. In Proceeding of 9th IEEE International Conference on e-Health Networking, Application and Services, Taipei, Taiwan. 19–22 Jun. 244–247

  29. Wang Z, Bovik AC (2002) A universal image quality index. IEEE Signal Proc Lett 9(3):81–84

    Article  Google Scholar 

  30. Wang RZ, Lin CF, Lin JC (2000) Hiding data in images by optimal moderately-significant-bit replacement. Electron Lett 36(25):2069–2070

    Article  Google Scholar 

  31. Wang RZ, Lin CF, Lin JC (2001) Image hiding by optimal lsb substitution and genetic algorithm. Pattern Recogn 34(3):671–683

    Article  MATH  Google Scholar 

  32. Wu DC, Tsai WH (2003) A steganographic method for images by pixel-value differencing. Pattern Recogn Lett 24(9–10):1613–1626

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jindal Balkrishan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Balkrishan, J., Singh, A.P. Concealing data in a digital image with multilayer security. Multimed Tools Appl 75, 7045–7063 (2016). https://doi.org/10.1007/s11042-015-2631-4

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-015-2631-4

Keywords

Navigation